• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.026 seconds

An Analysis on Limited Warfare through the Falkland Islands Dispute (포클랜드제도 분쟁을 통한 제한전 분석)

  • Yang, Seong-sil;Lee, Hee-wan;Shin, Jin
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.211-235
    • /
    • 2021
  • As a result of the Falkland Islands War from April 2 to June 14, 1982, Britain overcame severe economic depression and reclaimed the glory of the former British Empire by winning the war. On the other hand, Argentina was greatly affected by the collapse of a military dictatorship and the birth of a democratic government. This study suggests strategies for responding to maritime disputes that may occur in Dokdo Island in the future by applying "DIME on PMESII" to the Falkland Islands dispute. In particular, the study analyzes how DIME (diplomacy, information, military, and economy) capabilities have an effect as a means of the total national power of a country that effectively controls the disputed territory. Based on the results of this study, the response strategies related to the Dokdo maritime dispute are as follows. First, effective control over the disputed territory should be effectively maintained and strengthened like in Britain. This strategy inspires patriotism, supports the government during warfare, secures a just cause for war, and gains international support. Second, 'DIME on PMESII' was effective in modern warfare by focusing our DIME capabilities on the weaknesses of the other country's PMESII system. That is, wars are not won simply by the conflict of armed forces but by a nation's overall national strength, such as diplomatic, information, and economic capabilities. Third, appropriate strategies for neighboring countries are needed to overcome the possibility of limited warfare in the sea through preparations for Dokdo maritime disputes in the future.

  • PDF

A Study on the Method of Assigning Ipv6 address for M-BcN (M-BcN을 위한 IPv6 주소 할당 방안 연구)

  • Kim, Gweon-Il;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.87-100
    • /
    • 2007
  • The aspect of future warfare is NCW(Network Centric Warfare) in accordance with the IT development, so MND have the planning of M-BcN(Military Broadband convergence Network) establishment as the basic system of NCW by the end of 2008. IPv6 address must be managed systematically as a essential element of NCW. In the previous study, it is designed on the basis of the present military information communication network topology. However, it makes some problems. First, it is difficult for present topology to adapt the future M-BcN which is different from the present military network topology. Second, it has defects of inefficiency of route aggregation and enlargement of routing table size. In this paper, we improved the route aggregation and routing table size by assigning the hierarchical address on the basis of M-BcN topology and adjusting the position of field identifying service network. Furthermore, it is proved by the network simulation program(OPNET 12.0).

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

A Study on the Standardization of the combat system software in battleship using Object-oriented Design (함정 전투체계 표준화 설계 적용에 대한 연구)

  • KWON, KI-TAE
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.295-296
    • /
    • 2017
  • 본 논문에서는 과거 절차 지향적으로 개발 된 함정 전투체계을 표준화 된 새로운 전투체계 소프트웨어로 변화 시키는 방안을 제안한다. 최근 전투체계 소프트웨어는 새로운 장비의 추가와 기능 변경으로 수정이 빈번이 일어나고 있다. 이러한 확장성관련문제를 해결하기 위해 본 논문에서는 객체 지향 프로그래밍 및 디자인 패턴을 사용하여 전투체계 소프트웨어를 확장성과 유지보유성이 우수한 소프트웨어로 변경하는 방법을 연구하고 실제로 전투체계 소프트웨어 중 교전 모듈에 적용하는 과정을 보여준다. 그리고 함정전투체계에 이러한 표준화를 적용할 경우 어떠한 효용성이 있는지에 대하여 알아본다.

  • PDF

A Performance of Positioning Accuracy Improvement Scheme using Wavelet Denoising Filter (Wavelet Denoising Filter를 이용한 측위 정밀도 향상 기법 성능)

  • Shin, Dong Soo;Park, Ji Ho;Park, Young Sik;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.9-14
    • /
    • 2014
  • Recently, precision guided munition systems and missile defense systems based on GPS have been taking a key role in modern warfare. In warfare however, unexpected interferences cause by large/small scale fading, radio frequency interferences, etc. These interferences result in a severe GPS positioning error, which could occur late supports and friendly fires. To solve the problems, this paper proposes an interference mitigation positioning method by adopting a wavelet denoising filter algorithm. The algorithm is applied to a GPS/QZSS/Wi-Fi combined positioning system which was performed by this laboratory. Experimental results of this paper are based on a real field test data of a GPS/QZSS/Wi-Fi combined positioning system and a simulation data of a wavelet denoising filter algorithm. At the end, the simulation result demonstrates its superiority by showing a 21.6% improved result in comparison to a conventional GPS system.

Estimation of scan parameters for identification of the circular scanning radars (원형스캔 레이더 식별을 위한 스캔변수 추정기법)

  • Ryoo, Young-Jin;Ha, Hyoun-Joo;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.6 s.312
    • /
    • pp.105-112
    • /
    • 2006
  • To improve the performance of identification for radars in an ES(Electronic warfare Support) system, it is necessary to estimate scan characteristics as well as the basic identification parameters such as frequency, pulse repetition interval and pulse width of radars. This paper presents the method of estimating the scan period and the scan beam width of circular scanning radars. The proposed method estimates the scan period using the quality of the autocorrelation of a periodic signal. And, it estimates the scan beam width using the linear interpolation and the proposed method of estimating the scan period. Simulation results are presented to show the performance of the proposed method.

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.